Vulnerability Description
The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.2.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/06/25/1
- http://www.openwall.com/lists/oss-security/2013/06/26/4
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/06/25/1
- http://www.openwall.com/lists/oss-security/2013/06/26/4
FAQ
What is CVE-2013-2211?
CVE-2013-2211 is a vulnerability with a CVSS score of 7.4 (HIGH). The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest admin...
How severe is CVE-2013-2211?
CVE-2013-2211 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2211?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.